article thumbnail

What is an ISAC or ISAO? How these cyber threat information sharing organizations improve security

CSO Magazine

An Information Sharing and Analysis Center (ISAC) is an industry-specific organization that gathers and shares information on cyber threats to critical infrastructure. Get the latest from CSO by signing up for our newsletters. ]. ISACs also facilitate the sharing of data between public and private sector groups.

article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.

CSO 235
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: Scary Cyber Threats and Sweet Solutions

CSO Magazine

What is even scarier: Not having systems in place to protect against malware and other cyber threats. Cyber Threats That Frighten Even The Experts. It's not just malware that poses a threat to an enterprise's systems. Sweet Solutions to Cyber Threats. The CIS Community Defense Model v2.0

article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.

article thumbnail

The 10 most dangerous cyber threat actors

CSO Magazine

When hacking began many decades ago, it was mostly the work of enthusiasts fueled by their passion for learning everything they could about computers and networks.

article thumbnail

Cyber threat intelligence programs: Still crazy after all these years

CSO Magazine

When I asked CISOs about their cyber threat intelligence (CTI) programs about five years ago, I got two distinct responses. Large, well-resourced enterprises were investing their threat intelligence programs with the goal of better operationalizing it for tactical, operational, and strategic purposes.

article thumbnail

7 tips for better CISO-CFO relationships

CSO Magazine

Sign up for CSO newsletters. ]. The CFO/treasurer-CISO relationship is critical in understanding how the [organization] measures success, which helps with how best to measure and communicate the cyber threats it faces,” says Arthur Treichel, CISO for the State of Maryland. To read this article in full, please click here

CISO 137